Good point … and totally agree that the word “hacking” used to mean something - 
now it just kinda makes people laugh and not take it seriously at all anymore…


> On Oct 21, 2016, at 4:44 PM, Ken Hohhof <af...@kwisp.com> wrote:
> 
> I think his point was that a denial of service attack is not hacking.
>  
> I just heard on the radio someone was asking, if I try to use Twitter and it 
> doesn’t work because of this attack, is my computer how hacked?
>  
> Even stuff that rightly gets called hacking is an insult to hackers.  Like if 
> your webcam is on a public IP address and I guess that the password is 1234, 
> and that gets me root access to install whatever I want, it hardly seems 
> right to call that hacking.
>  
> But taking down a site by flooding it (or its authoritative DNS servers) with 
> traffic is not the same as hacking the site.
>  
>   <>
> From: Af [mailto:af-boun...@afmug.com <mailto:af-boun...@afmug.com>] On 
> Behalf Of Paul Stewart
> Sent: Friday, October 21, 2016 3:34 PM
> To: af@afmug.com <mailto:af@afmug.com>
> Subject: Re: [AFMUG] Another large DDoS, Stop Being a Dick
>  
> Agree…. it should be focused on end users better securing themselves …. 
>  
>> On Oct 21, 2016, at 3:44 PM, That One Guy /sarcasm 
>> <thatoneguyst...@gmail.com <mailto:thatoneguyst...@gmail.com>> wrote:
>>  
>> Im getting irritated by news reports calling this hacking. That term has 
>> been so obfuscated by dimwits that it has no value
>>  
>> On Fri, Oct 21, 2016 at 1:54 PM, Josh Luthman <j...@imaginenetworksllc.com 
>> <mailto:j...@imaginenetworksllc.com>> wrote:
>>> It works great for me 90% of the time.  The other 10% it refuses to 
>>> function at all.
>>> 
>>>  
>>> Josh Luthman
>>> Office: 937-552-2340 <tel:937-552-2340>
>>> Direct: 937-552-2343 <tel:937-552-2343>
>>> 1100 Wayne St
>>> Suite 1337
>>> Troy, OH 45373
>>>  
>>> On Fri, Oct 21, 2016 at 2:50 PM, Paul Stewart <p...@paulstewart.org 
>>> <mailto:p...@paulstewart.org>> wrote:
>>>> LOL …. scary shit….
>>>>  
>>>> Facebook being slow isn’t anything new in my experience … they have to be 
>>>> having a hard time keeping up sometimes …. last I heard they were adding 
>>>> something around 200-300 new servers a day in each data centre
>>>>  
>>>>> On Oct 21, 2016, at 2:48 PM, That One Guy /sarcasm 
>>>>> <thatoneguyst...@gmail.com <mailto:thatoneguyst...@gmail.com>> wrote:
>>>>>  
>>>>> forcing people to interact in person... a dangerous prospect in these 
>>>>> times
>>>>>  
>>>>> On Fri, Oct 21, 2016 at 1:43 PM, Tim Reichhart 
>>>>> <timreichh...@hometowncable.net <mailto:timreichh...@hometowncable.net>> 
>>>>> wrote:
>>>>>> It seems like facebook is also getting slow.
>>>>>>  
>>>>>>> 
>>>>>>> -----Original Message-----
>>>>>>> From: "Travis Johnson" <t...@ida.net <mailto:t...@ida.net>>
>>>>>>> To: af@afmug.com <mailto:af@afmug.com>
>>>>>>> Date: 10/21/16 02:37 PM
>>>>>>> Subject: Re: [AFMUG] Another large DDoS, Stop Being a Dick
>>>>>>> 
>>>>>>> This is still going right now... big and small websites and ISP's are 
>>>>>>> unreachable and unresponsive. :(
>>>>>>> 
>>>>>>> Travis
>>>>>>> 
>>>>>>> 
>>>>>>> On 10/21/2016 12:19 PM, Ken Hohhof wrote:
>>>>>>>  
>>>>>>>> Interesting, according to that, the ISP DNS servers are recruited as 
>>>>>>>> part of the attack on the victim's authoritative DNS servers, by 
>>>>>>>> sending queries from within the ISP's network.
>>>>>>>>  
>>>>>>>> No spoofing, no amplification, no misconfigured DNS servers required, 
>>>>>>>> yet the ISP's DNS servers are used to send the attack traffic. All 
>>>>>>>> that is needed is a compromised IoT to send the query.
>>>>>>>>  
>>>>>>>>  
>>>>>>>> From: Af [mailto:af-boun...@afmug.com <mailto:af-boun...@afmug.com>] 
>>>>>>>> On Behalf Of Josh Baird
>>>>>>>> Sent: Friday, October 21, 2016 12:42 PM
>>>>>>>> 
>>>>>>>> To: af@afmug.com <mailto:af@afmug.com>
>>>>>>>> Subject: Re: [AFMUG] Another large DDoS, Stop Being a Dick
>>>>>>>>  
>>>>>>>>  
>>>>>>>> Right - crap IoT devices on the Mirai botnet were responsible for 
>>>>>>>> shoving 620+Gbps of traffic at Akamai to take down Krebs (and over 
>>>>>>>> 1Tbps to take down OVH). No spoofing involved.
>>>>>>>>  
>>>>>>>> Interesting article on the techniques used by Mirai:
>>>>>>>>  
>>>>>>>> https://f5.com/about-us/news/articles/mirai-the-iot-bot-that-took-down-krebs-and-launched-a-tbps-ddos-attack-on-ovh-21937
>>>>>>>>  
>>>>>>>> <https://f5.com/about-us/news/articles/mirai-the-iot-bot-that-took-down-krebs-and-launched-a-tbps-ddos-attack-on-ovh-21937>
>>>>>>>>  
>>>>>>>>  
>>>>>>>> On Fri, Oct 21, 2016 at 1:30 PM, Ken Hohhof <af...@kwisp.com 
>>>>>>>> <mailto:af...@kwisp.com>> wrote:
>>>>>>>>> The amplifier would receive a query from a spoofed IP address, and 
>>>>>>>>> respond using a legit IP address. So the attacker needs to control 
>>>>>>>>> some computers that can spoof the victim's IP address, but the actual 
>>>>>>>>> attack traffic comes from the amplifiers using legit source IPs.
>>>>>>>>>  
>>>>>>>>> In the case of IoT botnets, I'm not sure any spoofing is required.
>>>>>>>>>  
>>>>>>>>>   <>
>>>>>>>>> From: Af [mailto:af-boun...@afmug.com <mailto:af-boun...@afmug.com>] 
>>>>>>>>> On Behalf Of Josh Baird
>>>>>>>>> Sent: Friday, October 21, 2016 12:21 PM
>>>>>>>>> To: af@afmug.com <mailto:af@afmug.com>
>>>>>>>>> Subject: Re: [AFMUG] Another large DDoS, Stop Being a Dick
>>>>>>>>>  
>>>>>>>>> It's a good start. It attempts to prevent spoofed traffic originating 
>>>>>>>>> from your network to leave your network (or BCP38).
>>>>>>>>>  
>>>>>>>>> On Fri, Oct 21, 2016 at 1:19 PM, Josh Luthman 
>>>>>>>>> <j...@imaginenetworksllc.com <mailto:j...@imaginenetworksllc.com>> 
>>>>>>>>> wrote:
>>>>>>>>>> It can't be that simple...can it?
>>>>>>>>>> 
>>>>>>>>>>  
>>>>>>>>>> Josh Luthman
>>>>>>>>>> Office: 937-552-2340 <http://tel:937-552-2340>
>>>>>>>>>> Direct: 937-552-2343 <http://tel:937-552-2343>
>>>>>>>>>> 1100 Wayne St
>>>>>>>>>> Suite 1337
>>>>>>>>>> Troy, OH 45373
>>>>>>>>>>  
>>>>>>>>>>  
>>>>>>>>>> On Fri, Oct 21, 2016 at 1:17 PM, Mike Hammett <af...@ics-il.net 
>>>>>>>>>> <mailto:af...@ics-il.net>> wrote:
>>>>>>>>>>> /ip firewall address-list
>>>>>>>>>>> add list="Public-IPs" address=x.x.x.x/yy disabled=no comment="My 
>>>>>>>>>>> IPs"
>>>>>>>>>>> add list="Public-IPs" address=x.x.x.x/yy disabled=no 
>>>>>>>>>>> comment="Downstream customer X IPs"
>>>>>>>>>>> 
>>>>>>>>>>> /ip firewall filter
>>>>>>>>>>> add action=drop chain=forward comment="Drop spoofed traffic" 
>>>>>>>>>>> disabled=no out-interface="To-Upstream" 
>>>>>>>>>>> dst-address-list=!"Public-IPs"
>>>>>>>>>>> 
>>>>>>>>>>> That was largely composed off of the top of my head and typed on my 
>>>>>>>>>>> phone, so it may not be completely accurate.
>>>>>>>>>>> 
>>>>>>>>>>> 
>>>>>>>>>>> You should also do it on customer-facing ports not allowing 
>>>>>>>>>>> anything to come in, but that would be best approached once 
>>>>>>>>>>> Mikrotik and the per interface setting for unicast reverse path 
>>>>>>>>>>> filtering. You would then said customer facing interfaces to strict 
>>>>>>>>>>> and all other interfaces to loose. They accepted the feature 
>>>>>>>>>>> request, just haven't implemented it yet.
>>>>>>>>>>> 
>>>>>>>>>>> 
>>>>>>>>>>> 
>>>>>>>>>>> -----
>>>>>>>>>>> Mike Hammett
>>>>>>>>>>> Intelligent Computing Solutions <http://www.ics-il.com/>
>>>>>>>>>>>  <https://www.facebook.com/ICSIL> 
>>>>>>>>>>> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb> 
>>>>>>>>>>> <https://www.linkedin.com/company/intelligent-computing-solutions> 
>>>>>>>>>>> <https://twitter.com/ICSIL>
>>>>>>>>>>> Midwest Internet Exchange <http://www.midwest-ix.com/>
>>>>>>>>>>>  <https://www.facebook.com/mdwestix> 
>>>>>>>>>>> <https://www.linkedin.com/company/midwest-internet-exchange> 
>>>>>>>>>>> <https://twitter.com/mdwestix>
>>>>>>>>>>> The Brothers WISP <http://www.thebrotherswisp.com/>
>>>>>>>>>>>  <https://www.facebook.com/thebrotherswisp>
>>>>>>>>>>> 
>>>>>>>>>>> 
>>>>>>>>>>>  <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
>>>>>>>>>>> From: "Mike Hammett" <af...@ics-il.net <mailto:af...@ics-il.net>>
>>>>>>>>>>> To: af@afmug.com <mailto:af@afmug.com>
>>>>>>>>>>> Sent: Friday, October 21, 2016 11:21:35 AM
>>>>>>>>>>> Subject: [AFMUG] Another large DDoS, Stop Being a Dick
>>>>>>>>>>> 
>>>>>>>>>>> There's another large DDoS going on now. Go to this page to see if 
>>>>>>>>>>> you can be used for UDP amplification (or other spoofing) attacks:
>>>>>>>>>>> 
>>>>>>>>>>> https://www.caida.org/projects/spoofer/ 
>>>>>>>>>>> <https://www.caida.org/projects/spoofer/>
>>>>>>>>>>> 
>>>>>>>>>>> Go to these pages for more longer term bad behavior monitoring:
>>>>>>>>>>> 
>>>>>>>>>>> https://www.shadowserver.org/wiki/ 
>>>>>>>>>>> <https://www.shadowserver.org/wiki/>
>>>>>>>>>>> https://radar.qrator.net/ <https://radar.qrator.net/>
>>>>>>>>>>> 
>>>>>>>>>>> 
>>>>>>>>>>> Maybe we need to start a database of ASNs WISPs are using and start 
>>>>>>>>>>> naming and shaming them when they have bad actors on their network. 
>>>>>>>>>>> This is serious, people. Take it seriously.
>>>>>>>>>>> 
>>>>>>>>>>> 
>>>>>>>>>>> 
>>>>>>>>>>> -----
>>>>>>>>>>> Mike Hammett
>>>>>>>>>>> Intelligent Computing Solutions <http://www.ics-il.com/>
>>>>>>>>>>>  <https://www.facebook.com/ICSIL> 
>>>>>>>>>>> <https://plus.google.com/+IntelligentComputingSolutionsDeKalb> 
>>>>>>>>>>> <https://www.linkedin.com/company/intelligent-computing-solutions> 
>>>>>>>>>>> <https://twitter.com/ICSIL>
>>>>>>>>>>> Midwest Internet Exchange <http://www.midwest-ix.com/>
>>>>>>>>>>>  <https://www.facebook.com/mdwestix> 
>>>>>>>>>>> <https://www.linkedin.com/company/midwest-internet-exchange> 
>>>>>>>>>>> <https://twitter.com/mdwestix>
>>>>>>>>>>> The Brothers WISP <http://www.thebrotherswisp.com/>
>>>>>>>>>>>  <https://www.facebook.com/thebrotherswisp>
>>>>>>>>>>> 
>>>>>>>>>>> 
>>>>>>>>>>>  <https://www.youtube.com/channel/UCXSdfxQv7SpoRQYNyLwntZg>
>>>>>>>>>>>  
>>>>>>>>>>>  
>>>>>>>>>>>  
>>>>>>>>>>>  
>>>>>>>>>>>  
>>>>>>>>>>  
>>>>>>>>>>  
>>>>>>>>>>  
>>>>>>>>>>  
>>>>>>>>> 
>>>>>>>>>  
>>>>>>>>>  
>>>>>>>>>  
>>>>>>>>>  
>>>>>>>>  
>>>>>>>>  
>>>>>>>>  
>>>>>>>>  
>>>>>>>  
>>>>>>  
>>>>> 
>>>>> 
>>>>> 
>>>>>  
>>>>> -- 
>>>>> If you only see yourself as part of the team but you don't see your team 
>>>>> as part of yourself you have already failed as part of the team.
>>>> 
>>>>  
>>> 
>>>  
>> 
>> 
>> 
>>  
>> -- 
>> If you only see yourself as part of the team but you don't see your team as 
>> part of yourself you have already failed as part of the team.

Reply via email to